Security & Ethical Hacking: Attacking Unix and Windows

Instructor: Ahmed M. Hamza

What you'll learn

  •   Conduct basic and advanced attacks on Unix systems.
  •   Leverage programming and scripting for privilege escalation and lateral movement in computer networks.
  •   Discover, debug and exploit binary vulnerabilities on modern operating systems.
  •   
  •   Advanced Offensive Techniques on hardened computer systems and networks.
  •   
  • Skills you'll gain

  •   Unix
  •   Debugging
  •   Microsoft Windows
  •   Computer Architecture
  •   Cyber Security Assessment
  •   System Programming
  •   Penetration Testing
  •   OS Process Management
  •   Secure Coding
  •   Unix Commands
  •   Application Security
  •   Security Testing
  •   Vulnerability Assessments
  •   Linux
  • There are 5 modules in this course

    A basic review of relevant x86 Assembly language constructs will be given. Students will utilize scripting and low-level programming and other technical means to execute a variety of attacks in adversarial recon, lateral movement, privilege escalation, and authentication bypass on Unix systems, as well as active exploitation of remote memory corruption attacks on multiple OS. An introduction to general computer memory is given, along with other topics in operating systems, as needed. An understanding of C/C++ compiled program languages, code debugging, python programming, and basic computer architecture is required. Experience with Assembly Language programming (Intel) and UNIX command-line (scripting) is preferred. The course is geared towards students in Computer Science, Computer Engineering, and similar domains – but those with sufficient hours of experience in the topics mentioned will be able to follow the material. This course can be taken for academic credit as part of CU Boulder’s Masters of Science in Computer Science (MS-CS) degrees offered on the Coursera platform. This fully accredited graduate degree offer targeted courses, short 8-week sessions, and pay-as-you-go tuition. Admission is based on performance in three preliminary courses, not academic history. CU degrees on Coursera are ideal for recent graduates or working professionals. Learn more: MS in Computer Science: https://coursera.org/degrees/ms-computer-science-boulder

    Abusing the Unix Security Model - Privilege Escalation

    Evasive Privilege Escalation on Linux

    Lateral Movement Techniques on Unix

    Memory Corruption and User-Mode Exploitation on MSFT Windows

    Explore more from Computer Security and Networks

    ©2025  ementorhub.com. All rights reserved